H04L2101/37

Authentication method and system
11004015 · 2021-05-11 · ·

Provide herein is a method and system capable of authenticating transactions involving at least one service provider and one or more users who are each in electronic communication. This electronic communication can be, for example, SMS, MMS, e-mail, or online account messaging. It is an aspect of certain embodiments where the transaction is an authentication and/or verification of an entity. Examples of such entities are products, actions and users.

Electronic message identifier aliasing

A method may include receiving an outbound communication directed to one or more recipient addresses from a communications infrastructure hosting the true address for the user. A server or similar intermediary may generate an alias address for each recipient address in an outbound communication so that each recipient may communicate with the true address using a unique reply channel. A discrete security state may be assigned as a security attribute to each such alias address. The discrete security state, which can be controlled by the user and stored, e.g., at the intermediate server, establishes rules for controlling communications from one of the recipient addresses through the communications infrastructure to the true address via one of the alias addresses. Once an alias and a security state are assigned in this manner to facilitate handling of responsive communications, the outbound communication may be forwarded to recipient addresses through the communication network.

System and method for detecting sources of abnormal computer network messages
10938694 · 2021-03-02 ·

A system for detecting a source or destination of abnormal message traffic on a network, the system having: an abnormality detection engine configured to track messages between a plurality of sources and a plurality of destinations; and one or more abnormality detectors configured to: determine a bandwidth variation of a rate of messages to a destination, wherein determining the bandwidth variation comprises: generate a bandwidth counter for each destination; update the bandwidth counter based on the rate of messages to a destination; determine if a predetermined amount of time has passed; and compare values in the source and destination pair counter to a predetermined source and destination pair threshold and comparing values in the bandwidth counter to a predetermined steady rate of messages after the predetermined amount of time has passed to determine if there is abnormal message traffic related to a source or destination based on both comparisons.

Management Device, Management Method, and Management Program
20210049556 · 2021-02-18 ·

An support system server (100) accepts, for each board related to crisis response activity, browsing of one or more messages registered in the board and registration of a message in the board. When a transmission source of a received e-mail is an e-mail address of a user of the board, the support system server (100) registers a message included in the e-mail in the board. When a new message is registered in the board, the support system server (100) distributes an e-mail including the message to the e-mail address of the user of the board.

Systems and methods for filtering electronic activities by parsing current and historical electronic activities

The present disclosure relates to systems and methods for filtering electronic activities. The method includes identifying an electronic activity. The method includes parsing the electronic activity to identify one or more electronic accounts in the electronic activity. The method includes determining, responsive to parsing the electronic activity, that the electronic activity is associated with an electronic account of the one or more electronic accounts. The method includes selecting, based on the electronic account, one or more filtering policies associated with the data source provider to apply to the electronic activity. The method includes determining, by applying the selected one or more filtering policies to the electronic activity, to restrict the electronic activity from further processing based on the electronic activity satisfying at least one of the selected one or more filtering policies. The method includes restricting, the electronic activity from further processing.

System, Method, and Apparatus for Virtualizing Digital Assistants
20210076206 · 2021-03-11 · ·

A system and method for providing anonymous communications from a user to a called party includes obtaining a dedicated phone number and creating a user account for the user and assigning the dedicated phone number to the user account. A provider account is created for a digital assistant using the dedicated phone number and the digital assistant is preprogrammed with the user account. The digital assistant is also preprogrammed with a skill for recognizing a specific utterance (e.g. Call). Connectivity is provided between the digital assistant and the Internet, for example, using a wireless access point. The digital assistant listens for the specific utterance and, upon recognizing the specific utterance followed by an identification of the called party, the digital assistant initiates a voice call through the Internet to the called party.

SYSTEMS, METHODS, AND DEVICES FOR DIGITAL ADVERTISING ECOSYSTEMS IMPLEMENTING CONTENT DELIVERY NETWORKS UTILIZING EDGE COMPUTING
20210090126 · 2021-03-25 ·

Disclosed herein are systems and techniques for using a content delivery network to perform various functions within a digital advertising ecosystem, in ways that yield technological benefits such as improved security, efficiency, and speed (for example, reduction in publisher load times). As one specific example, a content delivery network can be used for the creation of electronic tokens for user identity protection between demand side platforms, supply side platforms, content creators (for example, advertisers), and publishers.

System, Method, and Apparatus for Dispatching Help
20210084477 · 2021-03-18 · ·

A system for providing help includes a digital assistant and a network for connecting the digital assistants to a server. A plurality of agent computers is connected to the server. The digital assistant is preprogrammed and centrally managed with at least one skill for recognizing a preprogrammed specific utterance followed by a request for help. After the preprogrammed specific utterance and request for help is detected by the digital assistant, the digital assistant initiates a request for help to the server and upon receiving the request for the help, the server assigns one of the agent computers and presents medical information regarding the user at the agent computer for better determining the type of help needed.

SYSTEMS AND METHODS FOR DETECTING EVENTS BASED ON UPDATES TO NODE PROFILES FROM ELECTRONIC ACTIVITIES

The present disclosure relates to methods, systems, and storage media for detecting events based on updates to node profiles from electronic activities. Exemplary implementations may access an electronic activity transmitted or received via an electronic account associated with a data source provider; generate a plurality of activity field-value pairs; maintain a plurality of node profiles; identify a first state of a first node profile of the plurality of node profiles; update the first node profile using the electronic activity; identify a second state of the first node profile subsequent to updating the first node profile using the electronic activity; detect a state change of the first node profile based on the first state and the second state; determine that the state change satisfies an event condition; and store an association between the first node profile and an event type corresponding to the event condition.

COMMUNICATION SYSTEM AND METHOD USING UNIQUE IDENTIFIERS
20230421524 · 2023-12-28 ·

A communication system in which a plurality of unique identifiers (license plates) from certain defined classes of unique identifiers (i.e. license plates) are converted into electronic addresses enabling digital communication, content, and commerce to be transferred to the associated address. A verified rightful holder of the unique identifier can claim rights which can grant access to the digital data that has been transferred to the assigned electronic address. A sender, without knowing the identity of the holder of the unique identifier, may communicate a message to the converted corresponding electronic address in the hopes that the holder will claim the email address through a verification process. A central domain repository may be used to determine and publish a uniform convention for the unique identifier, to establish a standard that is universal.